Sunday 23 November 2014

What is AJAX?


AJAX = Asynchronous JavaScript and XML.

AJAX is a technique for creating fast and dynamic web pages.

AJAX allows web pages to be updated asynchronously by exchanging small amounts of data with the server behind the scenes. This means that it is possible to update parts of a web page, without reloading the whole page.

Classic web pages, (which do not use AJAX) must reload the entire page if the content should change.

Examples of applications using AJAX: Google Maps, Gmail, Youtube, and Facebook tabs.

How AJAX Works


AJAX



AJAX is Based on Internet Standards


AJAX is based on internet standards, and uses a combination of:
  • XMLHttpRequest object (to exchange data asynchronously with a server)
  • JavaScript/DOM (to display/interact with the information)
  • CSS (to style the data)
  • XML (often used as the format for transferring data)

Tuesday 14 October 2014

Malware is a short form of Malicious software.Some common and dangerous malware known to us are:

VIRUSES
A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels. Viruses can
range in severity from causing mildly
annoying effects to damaging data or
software and causing denial-of-service (DoS) conditions. Almost all viruses are attached to an executable file , which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or
program. When the host code is executed, the viral code is executed as well. Normally,the host program keeps functioning after it
is infected by the virus. However some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread
when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail
attachments.
WORMS
Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of
damage. In contrast to viruses, which
require the spreading of an infected host file, worms are standalone software and do
not require a host program or human help to propagate. To spread, worms either
exploit a vulnerability on the target system or use some kind of social engineering to
trick users into executing them. A worm enters a computer through a vulnerability
in the system and takes advantage of file- transport or information-transport features
on the system, allowing it to travel
unaided.
TROJANS
A Trojan is another type of malware named after the wooden horse the Greeks used to
infiltrate Troy. It is a harmful piece of
software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it
can achieve any number of attacks on the host, from irritating the user (popping up
windows or changing desktops) to damaging
the host (deleting files, stealing data, or activating and spreading other malware,
such as viruses). Trojans are also known to
create back doors to give malicious users access to the system.
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an
e-mail attachment or downloading and running a file from the Internet

Friday 19 September 2014

Keyboard Shortcuts (Microsoft Windows)

1. CTRL+C (Copy)
2. CTRL+X (Cut)
... 3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box - Keyboard Shortcuts

1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts

1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)

MMC Console keyboard shortcuts

1. SHIFT+F10 (Display the Action shortcut menu for the selected item)
2. F1 key (Open the Help topic, if any, for the selected item)
3. F5 key (Update the content of all console windows)
4. CTRL+F10 (Maximize the active console window)
5. CTRL+F5 (Restore the active console window)
6. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
7. F2 key (Rename the selected item)
8. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote Desktop Connection Navigation

1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts

1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)

Tuesday 16 September 2014

As promised, Google has launched Android One Smartphones in India today at very affordable price. The Android One Smartphones launched by Google are Micromax Canvas A1, Spice Dream UNO and Karbonn Sparkle V. But before going any further let’s talk about “What is Android One?”

What is Android One?

Android One is a project by Google partnering with different OEM to bring affordable android smartphone with high quality hardware in developing countries.

Why Android One Smartphones are Special?

Android One Smartphones are basically an affordable version of nexus smartphones which comes with latest version of android and will be updated to latest version of android in the future at first. Google has promised that Android One Smartphones will be the one of the devices which will get Android L update first. Google said that every Android One Smartphone will comes with high quality hardware and will run the Android OS smoothly without any lags or hiccups.

Will Android One Smartphones launch in Nepal?

Google didn’t split out, Nepal will be one of the countries where Android One will launched but since we have an authorized dealers of Micromax, Spice and Karbonn companies in Nepal, we might expect to see these devices very soon in the market.
How much Android One Smartphones will cost in Nepal if it launches?
Right now Android One Smartphones by Spice, Karbonn and Micromax are priced at Rs. 6299, 6399 and 6499 respectively in India so they might cost somewhere around Nrs. 11500 in Nepal.
Now let’s talk about Micromax Canvas A1, Spice Dream UNO and Karbonn Sparkle V. All these smartphones comes with same specifications like:
  • Display: 4.5 inch IPS screen with a resolution of 854×480 pixels
  • Processor: 1.3GHz MediaTek Quad-core CPU with Mali-400 GPU
  • Memory: 1GB of RAM, 4GB internal Storage with microSD card slot
  • OS: Android V4.4.4 KitKat (Android L update Guaranteed)
  • Camera: 5MP rear camera and 2MP front facing camera
  • Connectivity: 3G, Wi-Fi, Bluetooth, Dual-SIM
  • Sensors: G-Sensor , Proximity sensor, Light sensor, E-Compass, Gyro Sensor
  • Battery: 1,700mAh battery
At the event today Google has also announced they has also partnered with Lava, Xolo, Lenovo, Panasonic, Asus, HTC, Acer, Intex and Alcatel to bring more Android One smartphones to more markets in future. With the launch of Android One Smartphones everyone is saying it’s the end of Feature Phones.

So the final question, Is it worth to buy if it launches in Nepal?

I would say yes if it launches in Nepal at around 11k price tag. With capable of running Android OS fluently and guaranteed update to latest version of Android in future, makes Android One Smartphone worth to buy. Don’t expect to play high graphic intensive games in these devices. Google made this phone for those who want a reliable and affordable smartphone also who don’t want to use a feature phone and want to try smartphone for the first time.
That’s it for now! Let us know what you think about Android One smartphones in the comment section below. JAI NEPAL

Tuesday 19 August 2014

SEO known as search engine optimization is the process of affecting the visibility of a website or a webpage in a search engine’s natural or organic search results. In general, the earlier and more frequently a site appears in the search results list, the more visitors it will receive from the search engine's users. SEO may target different kinds of search, including image search, local search, video search, academic search, news search and industry-specific vertical search engines.

As an internet marketing strategy, SEO considers how search engines work, what people search for, the actual search terms or keywords typed into search engines and which search engines are preferred by their targeted audience. Optimizing a website may involve editing its content, HTML and associated coding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines. Promoting a site to increase the number of backlinks, or inbound links, is another SEO tactic.

SEO techniques can be classified into two broad categories: techniques that search engines recommend as part of good design called white hat SEO, and those techniques of which search engines do not approve called black hat SEO. White hats tend to produce results that last a long time, whereas black hats anticipate that their sites may eventually be banned either temporarily or permanently once the search engines discover what they are doing.

Friday 20 June 2014

Did you guys tried naming a folder as 'con'? I am damn sure that you won't be able to make it by simply renaming and typing con. So i am here to show you how can we name a folder as 'con'.
  1. Rename folder from the right click option or press F2 function key.
  2. Now press and hold ALT key and type 255.
  3. Now write 'con' and press enter.
Now i guess you got a folder named 'con'. Enjoy the tricks and share with others.
The logic behind this trick is by pressing alt and numbers you will create a empty space denoted by special character and hence your folder name is actaully not 'con' but con is only visible.
This is the trick for the google search page.
  1. Open google.com
  2. Now goto the search setting
  3. Turn off the instant search
  4. Again goto google.com and type google gravity
  5. Now click on I am feeling lucky button.



Enjoy the trick with your friends and share.

Friday 21 March 2014

icc-cricket
For slow internet connection

Sunday 2 March 2014

It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-
Open Notepad.
Copy and paste the exact code given below without **:- Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION \System\CentralProcessor\0] "ProcessorNameString"="*My Processor name 50000MHz*" To change the processor name, edit the part of the code between ** i.e. My Processor name 50000MHz . Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0. Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.
Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive. Processor Name
Copy the created Shortcut file.
Navigate to C:\Documents and Settings\All Users \Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft \Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.) If C: is your System drive.
Paste the copied file.
Computer virus are such type of the programs that can be transmitted from one computer to another and cause the adverse effects to computer. These viruses can not only corrupt the files and data but also can damage the whole hard disk drive. In the past time these virus are transmitted from the email but nowadays pen drive or also known as the flash drive are the means to transmit the computer virus.
Some of the symptoms that are seen when the computer is affected by the virus are:
  1. The computer performs in slow than normal.
  2. The system gets crash and restart time to time.
  3. The application programs in the computer don't work properly.
  4. The menus are in unordered manner.
  5. The anti virus of the computer gets disabled.
  6. New folders are created automatically.
  7. Programs are lost from the hard disk.
Many of the computer users use windows operating system. Windows is vulnerable to the virus. But there is the full protection from the virus in the unix and linux operating system and also from the hacking problem.
While surfing the internet there is the maximum chance to get affected from the virus if you don't use the anti virus and firewall. The default browser of the windows called internet explorer is taken as the unsafe software in terms of the protection. Inside of this you can use other browsers like firefox, chrome etc. But the most safe way is the use of the latest and updated antivirus. The antivirus must be updated time to time in order to protect from the new virus in the internet world. Similarly downloading and running the unwanted softwares from internet may also cause the transmission of virus. The transmission of the virus by the use of the pen drive is due to the autoplay feature in computer. The autoplay makes the programs run itself whenver CD-ROM or the pendrive are inserted. In this way as you use the pendrive the autoplay makes the virus run automatically and spread in the system. Hence to protect the computer from this virus you should disable the autoplay feature in the computer. For the xp users these are the steps to disable the autoplay:
  • Open the run by clicking "run" in start menu.
  • Type gpedit.msc and enter.
  • Click computer configuration and open anministrative template.
  • Then click system and turn off the autoplay by double clicking.
Doing this the virus are not spread only by inserting the pendrive as the autoplay is disabled. If you are using other's computer then keep pressing shift button before inserting pendrive upto sometime you inserted it. This will make the autoplay disabled for a while. And open the pendrive with the folder explorer rather than double clicking.
If you are the internet user then you must use the firewall in order to protect your computer from the unauthorised access and hacking. Firewall is the software that can protect your computer from the access of the unauthorised users in the network. This also checks the each and every messages and data that pass through the network and access or block them as necessary. Firewall can also be used in the safe browsing of the websites. There are many types of the firewall like free firewall, software firewall, hardware firewall, desktop firewall etc. The desktop firewall protects from the remote login in the personal computers.
The addiction of the internet is very amazing. Once we stay on the internet surfing different things like the facebook, youtube etc all time is spent without one's knowledge. Hence sometimes we aren't able to finish our task due to this problem. Even we try to concentrate on the work rather than opening the browsers and surf internet, we actually can't do that and hence the work remains unfinished. This is the problem of many of the internet users. But there is the solution for this problem that will stop you from surfing the net or any websites. This is done by the software freedom apps which can block the assigned sites for required time interval.
This kind of the software is mostly utilized in the offices in order to make the employees concentrate on the official work rather than spend time on browsing other unrelated sites. The software can be used freely as the trial version and can be purchase later with more features. Large companies purchase those softwares and use it in their working place and blocks the unrelated sites which diverts the workers. This may be done for some time interval as required. In our personal computer also we can create it with the use of the freedom apps.
This freedom apps can be downloaded frommacfreedom.com and can be installed in both mac and windows and nowadays also available in android. Once the site is blocked then we can't browse that site even if we want until the time that is set isnot passed. So this apps help to let us concentrate on the work as the work can be remain incomplete if we surf the sites. Hence, this software has been proved to be a great product for the internet addicts and hence was made for same purpose. So why not to use it and save our time and important works as well.



Password is the combination of the letters, numbers or characters that are meant for the protection of the important things, documents etc. It is the key for the valuable things for the protection from the unauthorized persons. The main challenge in this era of information technology is protection. The password helps in the protection of many things like your computer system, social network accounts, emails, e-banking etc. Hence the password must be strong enough so that any other third person can't use your account for his own benefit and due to such reasons cyber crime occurs. Password is the main key that helps to protect any system and application. Hence using the weak password is very dangerous in the sense that it will make the hackers easy to crack your password and make access to your system. So here are some tips that you can follow to make a strong password so that it will be difficult to guess and crack the password.
  1. Use more than 8 characters in your password.
  2. Use combination of capital and small letters.
  3. Also use numbers and special characters in your password.
  4. Don't use simple words as password than
    can be easily guessed. Use some tricks like using zero '0' instead of 'o'.
     5. Don't use the dictionary words as hackers use random words to crack password
Some tips: 
  • Don't share your password with others like friends, family etc.
  • Change your password regularly time and again.
  • Don't note down the password in unsecure places like diary, wallet.
  • If you want to note down then use some personal code method to note password so that other cannot understand them.
  • Don't use the automatic log in, save password etc in the browsers.
  • Don't make same passwords for all accounts. Make different but similar passwords if you feel confusion.
  • Remember to log out your account or profile after you finish the work.
  • Donot click the unknown links and spam emails, they may be the hacking attempts.